?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
4
General Data Protection Runtime: Enforcing Transparent GDPR..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
5
Poster: The Risk of Insufficient Isolation of Database Tran..:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
6
Accept All Exploits: Exploring the Security Impact of Cooki..:
, In:
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
7
Hand Sanitizers in the Wild: A Large-scale Study of Custom ..:
, In:
?
Proceedings of the 22nd ACM Internet Measurement Conference ,
9
No keys to the kingdom required : a comprehensive invest..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
10
Server-Side Browsers : Exploring the Web's Hidden Attack..:
, In:
?
Proceedings of the 14th European Workshop on Systems Security ,
11
Talking About My Generation : Targeted DOM-based XSS Exp..:
, In:
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
13
Hybrid taint analysis for Java EE:
, In:
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
14
Raccoon : automated verification of guarded race conditi..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop ,
15